2022
DOI: 10.1007/s11042-022-12742-1
|View full text |Cite
|
Sign up to set email alerts
|

A unified improvement of the AES algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The Barbara and Cameraman images (Figure 1b and Figure 1d, respectively) are used to test the proposed encryption algorithm because, when using 256-gray-level images, there is a risk of poor-quality encryption if a secret-key cryptosystem is used. In fact, this is why AES is not used as a standard in image encryption, and the AES-CBC [47] cryptosystem is instead employed. Furthermore, in those images, parts are entirely white, and in the other image, parts are completely black.…”
Section: Images Used To Evaluate Iclebfmentioning
confidence: 99%
See 1 more Smart Citation
“…The Barbara and Cameraman images (Figure 1b and Figure 1d, respectively) are used to test the proposed encryption algorithm because, when using 256-gray-level images, there is a risk of poor-quality encryption if a secret-key cryptosystem is used. In fact, this is why AES is not used as a standard in image encryption, and the AES-CBC [47] cryptosystem is instead employed. Furthermore, in those images, parts are entirely white, and in the other image, parts are completely black.…”
Section: Images Used To Evaluate Iclebfmentioning
confidence: 99%
“…The procedure of the multiplicative noise is similar to the additive one. In fact, the value of I c is obtained according to Equation (47). Then, to apply the multiplicative noise shown in Equation ( 47), the value of I c is replaced by I c .…”
Section: Additive and Multiplicative Noisesmentioning
confidence: 99%
“…The AES algorithm is known for its high security and ease of implementation, and it has become the most widely used encryption algorithm in many security applications [22,23]. In [24], a unified algorithm based on AES is proposed, which improves the shift rows…”
Section: Introductionmentioning
confidence: 99%